{"id":11818,"date":"2017-02-17T21:37:08","date_gmt":"2017-02-18T03:37:08","guid":{"rendered":"https:\/\/web.saumag.edu\/academics\/?post_type=program&#038;p=11818"},"modified":"2025-08-27T09:34:39","modified_gmt":"2025-08-27T14:34:39","slug":"computer-science-privacy-cyber-security-option-3","status":"publish","type":"program","link":"https:\/\/web.saumag.edu\/academics\/program\/computer-science-privacy-cyber-security-option-3\/","title":{"rendered":"Computer Science (Privacy and Cyber Security Option)"},"content":{"rendered":"<p>This program offers students dual and complementary expertise in cyber security and privacy. Students develop a solid theoretical foundation and receive hands-on training on how to prevent, detect, and neutralize cyber-attacks. They also learn how to determine privacy compliance and design privacy compliant systems. Exclusive content on the recent advancements in cyber security and privacy are delivered in SAU\u2019s classes.<\/p>\n<div id=\"learning-goals\" class=\"alert alert-info\">\n<h3>Learning Goals<\/h3>\n<ol>\n<li>Our graduates communicate effectively.<\/li>\n<li>Our graduates can make ethical decisions related to the use of technology.<\/li>\n<li>Our graduates demonstrate the knowledge and principles of computer operating systems, architecture and machine organization to solve problems.<\/li>\n<li>Our graduates use technology effectively.<\/li>\n<li>Our graduates demonstrate the knowledge and analytical skills that are required for careers in computer science.<\/li>\n<\/ol>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>This program offers students dual and complementary expertise in cyber security and privacy. Students develop a solid theoretical foundation and receive hands-on training on how to prevent, detect, and neutralize cyber-attacks. They also learn how to determine privacy compliance and design privacy compliant systems. Exclusive content on the recent advancements in cyber security and privacy&#8230; <a class=\"more-link\" href=\"https:\/\/web.saumag.edu\/academics\/program\/computer-science-privacy-cyber-security-option-3\/\"> Read More<\/a><\/p>\n","protected":false},"featured_media":16444,"menu_order":0,"template":"","format":"standard","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":"","_genesis_title":"","_genesis_description":"","_genesis_noindex":"","_genesis_nofollow":"","_genesis_noarchive":"","_genesis_canonical_uri":"","_open_graph_title":"","_open_graph_description":"","_twitter_title":"","_twitter_description":"","_social_image_url":"","_social_image_id":"","redirect":"","_links_to":"","_links_to_target":""},"college_department":[18324,18306],"delivery":[28836,255],"types":[28854,28850],"class_list":{"0":"post-11818","1":"program","2":"type-program","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"college_department-mathematics-and-computer-science","8":"college_department-college-of-science-and-engineering","9":"delivery-hybrid","10":"delivery-on-campus","11":"types-major","12":"types-undergraduate","13":"entry"},"acf":{"department_college":"<a href=\"http:\/\/www.saumag.edu\/academics\/science_and_technology\/mathematics_and_computer_science\/\">Mathematics &amp; Computer Science<\/a>\u00a0\/\u00a0<a href=\"https:\/\/web.saumag.edu\/science\/\">College of Science &amp; Engineering<\/a>","Number_of_Hours":"120","Catalog Entry":"<h4>University Requirement (2 hours)<\/h4>\r\nGSTD 1002 - Freshman Seminar\r\n<h4>General Education (28 hours)<\/h4>\r\n<strong>Note:<\/strong> 7 hours of mathematics and physical science requirements are included in the major.\r\n<h4>Computer Science (51-53 hours)<\/h4>\r\nCSCI 2103 - Computer Science I and CSCI 2101 - Computer Science I Lab\r\nCSCI 2113 - Computer Science II and CSCI 2111 - Computer Science II Lab\r\nCSCI 3063 - High Level Language\r\nCSCI 3103 - Data Structures and Algorithms\r\nCSCI 3203 - Assembler and Machine Organization\r\nCSCI 3213 - Computer Networking\r\nCSCI 3233 - Theory of Computation\r\nCSCI 3703 - Computer Architecture\r\nCSCI 4133 - Operating Systems\r\nCSCI 4143 - Programming Languages and Compilers\r\nCSCI 4153 - Software Engineering\r\nCSCI 4203 - Database Design and Implementation\r\nCSCI 4922 - Senior Project I\r\nCSCI 4932 - Senior Project II\r\n9-11 hours of upper-level Computer Science, Data Science, or Mathematics electives\r\n<h4>Cyber Security and Privacy (12 hours)<\/h4>\r\nCSCI 3143 - Network Security\r\nCSCI 4213 - Privacy, Security, and Ethics\r\nCSCI 4223 - Cyber Forensics\r\nCSCI 4333 - Cyber Defense\r\n<h4>Mathematics (17-19 hours)<\/h4>\r\nMATH 2033 - Discrete Mathematics\r\nMATH 2753 - Linear Algebra\r\n<h4>Select 5 hours from the following:<\/h4>\r\nMATH 1525 - Calculus I\r\nMATH 2125 - Applied Calculus\r\n<h4>Select 3 hours from the following:<\/h4>\r\nMATH 3043 - Applied Probability and Statistics I\r\nMATH 4073 - Introduction to Probability and Statistics\r\n<h4>Select 3-5 hours from the following:<\/h4>\r\nMATH 1545 - Calculus II\r\nMATH 3143 - Applied Probability and Statistics II\r\nMATH 4233 - Data Science\r\nMATH 4533 - Statistical Methods\r\n<h4>Physics (4 hours)<\/h4>\r\nSelect <strong>one<\/strong> of the following course combinations:\r\n\r\nPHYS 2003 - College Physics I and PHYS 2001 - College Physics I Lab\r\nor\r\n\r\nPHYS 2203 - University Physics I and PHYS 2201 - University Physics I Lab\r\n<h4>Other Requirements (4 hours)<\/h4>\r\nCSCI 2001 - Information Technology Seminar\r\nENGL 3023 - Technical Writing\r\n<h4>Total Hours - 120<\/h4>","minor_requirements":"","Degree Plans":"<ul>\r\n \t<li><a href=\"https:\/\/catalog.saumag.edu\/preview_program.php?catoid=8&amp;poid=1736&amp;returnto=288\">2025-2026<\/a><\/li>\r\n \t<li><a href=\"https:\/\/catalog.saumag.edu\/preview_program.php?catoid=6&amp;poid=1193\">2024-2025<\/a><\/li>\r\n \t<li><a href=\"https:\/\/web.saumag.edu\/academics\/files\/2023\/11\/Computer-Science-Cyber-Security-and-Privacy.pdf\">2023-2024<\/a> [pdf]<\/li>\r\n \t<li><a href=\"https:\/\/web.saumag.edu\/academics\/files\/2017\/02\/Computer-Science-Cyber-Security.pdf\">2022-2023<\/a> [pdf]<\/li>\r\n \t<li><a href=\"https:\/\/web.saumag.edu\/academics\/files\/2014\/12\/comp-sci-cyber-21.pdf\">2021-2022<\/a> [pdf]<\/li>\r\n \t<li><a href=\"https:\/\/web.saumag.edu\/academics\/files\/2020\/06\/Computer-Science-Cyber-Security.pdf\">2020-2021<\/a> [pdf]<\/li>\r\n \t<li><a href=\"https:\/\/web.saumag.edu\/academics\/files\/2017\/02\/cs-cybersecurity-19-20.pdf\">2019-2020<\/a> [pdf]<\/li>\r\n \t<li><a href=\"https:\/\/web.saumag.edu\/academics\/files\/2016\/03\/cyber-security-2016-2017.pdf\">2016-2017<\/a>\u00a0[pdf]<\/li>\r\n<\/ul>","Program_Contact_Info":"","Advisors":"","Accreditations":"","Admission Requirements or Deadlines":"","Testimonials":"","rankings":"","careers":"","keywords":"cyber, cybersecurity, network, analyst, hack, security, ddos, privacy, protection, programming, coding","custom_tab_title":"","custom_tab_text":""},"_links":{"self":[{"href":"https:\/\/web.saumag.edu\/academics\/wp-json\/wp\/v2\/programs\/11818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.saumag.edu\/academics\/wp-json\/wp\/v2\/programs"}],"about":[{"href":"https:\/\/web.saumag.edu\/academics\/wp-json\/wp\/v2\/types\/program"}],"version-history":[{"count":4,"href":"https:\/\/web.saumag.edu\/academics\/wp-json\/wp\/v2\/programs\/11818\/revisions"}],"predecessor-version":[{"id":17297,"href":"https:\/\/web.saumag.edu\/academics\/wp-json\/wp\/v2\/programs\/11818\/revisions\/17297"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/web.saumag.edu\/academics\/wp-json\/wp\/v2\/media\/16444"}],"wp:attachment":[{"href":"https:\/\/web.saumag.edu\/academics\/wp-json\/wp\/v2\/media?parent=11818"}],"wp:term":[{"taxonomy":"college_department","embeddable":true,"href":"https:\/\/web.saumag.edu\/academics\/wp-json\/wp\/v2\/college_department?post=11818"},{"taxonomy":"delivery","embeddable":true,"href":"https:\/\/web.saumag.edu\/academics\/wp-json\/wp\/v2\/delivery?post=11818"},{"taxonomy":"types","embeddable":true,"href":"https:\/\/web.saumag.edu\/academics\/wp-json\/wp\/v2\/types?post=11818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}